SlideShare a Scribd company logo
1 of 5
Download to read offline
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 04 Pages: 2805-2809 (2016) ISSN: 0975-0290 2805
Presenting VALIT Frameworks and Comparing
between Them and Other Enterprise Architecture
Framework
Alireza Poorebrahimi
Department of Information Technology Management, Islamic Azad University, Science & Research Branch of Tehran,
Iran
Email: poorebrahimi@gmail.com
Firouzeh Razavi
Department of Information Technology Management, Islamic Azad University, Science & Research Branch of Tehran,
Iran
Email: firozehrazavi@gmail.com
Fatemeh SoleimaniRoozbahani Razavi
Department of Information Technology Management, Islamic Azad University, Science & Research Branch of Tehran,
Iran
Email: fatemeh.solaymani@srbiau.ac.ir
----------------------------------------------------------------------ABSTRACT-----------------------------------------------------------
It is necessary for each organization to move towards process-focused that it is supported and presided by
information technology (IT). IT is considered as a part of processes field. In the information technology era,
especially with the advent of network-based economy, organizations plans must be performed based on an
architectural design deserving Information Society. Enterprise Architecture provides a framework to design
organization based on Information Technology. Val IT framework is not related to enterprise architecture
frameworks, but rather to IT governance. IT governance is indeed a paradigm in which it is attempted to make all
activities and enterprise mechanisms for the planning, organizing, implementation and control of IT aligned and
consistent. This study first discusses the introduction of this framework; then, a comparison between this
framework and COBIT as well as between enterprise architecture and Val IT will be done.
Keywords: Enterprise Architecture Frameworks; COBIT; IT Government; Val IT Framework;
-------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: Jan 25, 2016 Date of Acceptance: Feb 02, 2016
-------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
In 21st
century, organizations are moving to be process-
focused and managers are concentrated on company's
processes; as a result, IT is a factor enabled for this
information [1]. Organizations need IT to increase the
integration and standardization of processes speed up the
process of globalization, restructure and changes frequent
to business. Information Technology helps organization be
process-focused. In this way, four processes and an IT-
related principle (i.e. architecture) support organization. In
fact, architecture indicates that how IT infrastructure will
be created and maintained. IT architecture is a plan or a
high-level scheme of an organization's information
properties including the physical plan of a structure which
in hardware is located. In fact, IT architecture is a tip and
plan for current activities to direct the future ones [2].
Providing IT architecture is a periodical process taken
from architecture. Top managers have found out that
information technology can significantly influence on
organization success. Managers hope that they increase
competitive power of organization by understanding and
recognizing applied IT-based methods or it is likely to
obtain their successful application. So managers are going
to ensure that IT organizations are looking for IT
governance strategies and they require increasing
management and supervision on IT.
II. IT GOVERNANCE
A. What is IT governance?
IT governance is considered as an integral part of
organization management. Governance is not a new
concept but it has existed since human civilization. In fact,
governance is meant to decision-making and
implementation of decisions [3].
Governance can be based on participatory, international,
national and local governance. IT governance is a kind
like this, as well. IT governance is a phrase used to
describe how people consider IT for supervising,
monitoring, controlling and leading attention in order to
manage an organization. IT governance is the
responsibility of the executive board and it focuses on the
effective management of communication and information
technology. An integral part of the organization includes
organizing and leadership of structures and processes to
ensure whether organization information technology
supports and develops objectives and strategies of the
organization or not. Managers has some negative
experiences of this technology adaption such as loss of
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 04 Pages: 2805-2809 (2016) ISSN: 0975-0290 2806
credibility, delay in services, lack of performance of main
processes of IT organization and its early failure leading
organization to perform IT governance leadership and due
to these IT governance become significant and was
employed in organizations [1].
To ensure achieving IT performance for following
objectives, IT governance is used:
 Aligning IT with the organization and realizing
promised profits.
 Using information technology to enable organizations
in order to take advantage of opportunities and
maximize the profits;
 Using resources related to IT as appropriate
 Appropriate risk management related to IT
IT leadership usually determines deviations from targets in
different layers by reporting supervisors to managers,
managers to executives and then to the board and in order
to solve them, necessary work is done with the approval of
management [4].
B. The significance of IT governance
IT governance is important and often, expectations do not
comply with what happens in reality; thus, management
should be done on:
 Using IT facilities with appropriate quality and
funding;
 Controlling and using information technology to
return commercial value;
 Using information technology to increase productivity
and efficiency while controlling IT risks.
For complete implementation of IT governance, there are
different standards such as COBIT, Related Cadbury and
Turnbull that among them, VAL IT and COBIT (provided
by the Institute of IT Governance) are accepted as a good
model for control of information, IT and related risks and
they have been selected for IT auditing leadership and
implementation.
III. VAL IT FRAMEWORK
Primary Val IT helps organizations to realize value
through optimizing the investment. Primary Val IT
encompasses a comprehensive set of research activities,
publications and aid services and it supports Val IT
framework core [5] (Fig. 1 shows Primary Val IT).
Figure1. Val IT framework
Val IT framework is almost consistent with COBIT.
COBIT provides a complete framework to deliver IT
services at a high level. COBIT set adjusts good practices
for processes of providing value, while Val IT provides
methods for the purposes that present some mechanisms to
measure, monitor and optimize the realization of
investments' business value in IT [5].
A. How Val IT is structured?
Val IT framework is structured in three fields that each
one includes a several processes and is performed through
the method of key management and also they have
maturity model individually including 5 steps [6]:
Figure2. Maturity steps
Value governance
 determining and implementing the processes
 providing effective governance supervision
 determining portfolio details
 Continuous improvement of value management
practices
portfolio management
 Evaluation program for financial expenses
 Determining the availability and financial
resources
 Human resources availability management
 Improving the performance of investment
portfolio
 Monitoring and reporting on the performance of
investment portfolio
Val IT
framework
Empirical
Analysis
criteria
determinatio
n
sample
technique
manual
stock
company
communicati
on impact
step 0•Non-existent
step 1•Initial
step 2•Repeatable
step 3•Defined
step 4•Managed
step 5•Optimize
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 04 Pages: 2805-2809 (2016) ISSN: 0975-0290 2807
Investment management
 Update business samples
 Understand the candidate program and implement
options
 Monitor and report on program
 Implementation and management of programs
 Update operational IT portfolio
IV. VAL IT VERSION 2.0
Val IT version 2.0 was released in July 2008 in which
more terms were nearly adopted with COBIT. It also
added more depth through added management guidelines.
However, these outlines create more detail in Val IT
processes, key management practices as well as maturity
models for each VAL IT area.
The latest version, Version 2.0 Val IT framework,
including IT services, assets and other resources
developed through new investments. This complete and
comprehensive framework leading to help create
investment through IT presents a practical set of
governance principles, processes and methods. This
framework also supports the guidelines that help the
executive management team and the other organizations
leaders. This framework provides direct support for
implementation at all levels of management both in
business and information technology. The existing
framework provides benchmarking capabilities and helps
organizations exchange experiences on best practices for
value management [7].
Mentioned framework providing a guide through the
operational tools and publications is supported by them.
This includes:
 Finding the relationship between businesses and IT
done by the responsible authority in organizations;
 Portfolio management of IT-based business
Investment;
 Maximizing quality of business samples for
investment that specifically emphasizes on the
definition of financial indicators, earnings and
comprehensive assessment of risks.
A. VAL IT framework components
Val IT framework takes into account enterprise
governance views and helps managers about 4 questions
of IT governance. These four questions are as follows:
(Figure 3)
Figure3. IT governance questions
1. Do we do the right things? (strategic question)
2. Do we get the profits? (value question)
3. Do we perform correctly? (Architecture question), On
the other hand COBIT encompasses IT perspective
and managers support to answer these questions.
4. Do we obtain them properly? (Delivery question)
Val IT framework helps increase the probability of
optional investment and create value by the highest
potential. This framework cuts down the costs and help to
decision-makers whether they should do the right things in
the investment or not".
It also reduces the risk of failure and issues related to
delivery and information technology costs. In contrast, it
increases business value and information technology
confidence level in the board, executive management, and
the other organizations' leaders [2].
B. similarities between COBIT, VAL IT
Val IT and COBIT provide a synergistic relationship. It is
essential to understand the relationship between these two
frameworks. In fact, Val IT framework complements
COBIT from a business and financial perspective and help
any business or professional IT with tendency to value
creation [6]. A connection between COBIT, VAL IT
portfolio management and investment mechanism is
possible. They offer an area in IT processes:
PO1: strategic IT planning,
PO5: Investment Management in Information Technology,
PO10: Projects Management
DS1: Definition and management of service levels
ME1: monitoring and evaluation of IT performance
1. Difference between COBIT and VALIT
VAL IT provides a framework for investment and current
value management and presents some aspects of this
framework for performing plans and earning delivery and
onset. While COBIT offers a framework for the
implementation of related IT and provides programs'
aspects [8]. These programs include the delivery of
information technology strategies, operational
implementation of information technology and service
Do we do the
right things?
Do we get
the
benefits?
Do we perform
correctly?
Do we do
things the right
way?
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 04 Pages: 2805-2809 (2016) ISSN: 0975-0290 2808
delivery. However, Val IT framework can be implemented
without COBIT. Table 1 compares these two frameworks.
Governance
focus
Portfolio
focus
Process focus
 Enterprise
governance
 Informatio
n
technology
 Investmen
t portfolio
management
 Providing
general view
of portfolio
performance
 aspects of
Investment and
current value
managementVal IT
 IT
governance
 IT project
portfolio
management
 IT service
management,
assets and
other
resources
portfolio
 Offering IT
strategy
 Operational
implementatio
n of IT
 IT service
delivery
COBI
T
Table 1: Comparison of Val IT and COBIT framework
Now, it is proposed the general comparison between IT
governance and architecture organization with regard to
the introduction of this framework and its other family
(COBIT). First, we define the alignment:
 "Management and use of IT in organization in order
to respond to business needs, enable new objectives
and obtain competitive advantage"
Aligning business and IT can be considered as
"relationship-, "architecture-, and governance-based". In
this paper, these two dimensions (architecture and
governance) are taken account. It can be pointed that there
is a profound difference between IT governance and
enterprise architecture:
IT governance: It ensures that while IT supports business
objectives, optimizes business investment in IT and
manages IT-related risks and opportunities. Enterprise
architecture governance (EA governance) is more complex
than IT governance and is associated with architecture
governance. Governance focus in a SOA environment is
that we confide to service-oriented strategy in the
capabilities, assets and investments providing and
delivering the necessary levels of business capability and
technique.
C. Comparison between IT governance and enterprise
architecture
According to the distinction between IT governance and
enterprise architecture and how it is used in organization, a
general comparison between them was conducted in
Table2.
Governance-
based
Enterprise architecture-
based
COBIT, Val IT
strategy map
Zach man, Federal, FEAF,
TOGAF / EAPModel / Method
Provide value,
resource control,
performance
evaluation
Integration of applications,
modeling processesViewpoint
Reform / PolicyVisas / scenarios
Stimulus
It has 5 steps
Jaap Schekkerman model
(IFEAD model– Institute
For Enterprise
Architecture
Developments(
Enterprise
Architecture
Maturity
Determine the
processes and
activities (top-
down)
quality of enterprise
architectureMetrics
-
Exist in the framework of
the architectureSOA
Exist in Val IT,
COBIT
not mention directly
Deliver value and
realized profit and
minimize risk
Table 2: Comparison of IT governance and enterprise
architecture
V. CONCLUSION
IT is an integral part of the business and its governance is
an integral part of organization management. In IT
governance, it should be clearly specified the roles and
responsibilities. In fact, it is paradigmatic in which it is
tried to align all activities and enterprise mechanism for
the planning, organization, implementation and control of
IT. Val IT framework is related to IT governance and
includes accepted guidelines and supported processes.
They are associated to the evaluation and selection of
investment business, profit realization and value delivery.
This framework is based on the COBIT and management
processes are used to provide Val IT principles and return
on investment. Mentioned management processes include
value governance, portfolio management, and investment
management. In fact, this framework is related to
expenses, risks and outcomes. These balance business
investment portfolio. Existing frameworks of enterprise
architecture are more complex than Val IT.
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 04 Pages: 2805-2809 (2016) ISSN: 0975-0290 2809
REFERENCES
[1] S. R. Khayami, "Organization Analysis and
Architecture," Shiraz University, 2009.
[2] Z. Nourizadeh, A. Nourizadeh, and M. Mahdavi,
"Implementing information technology
governance using val IT; Case study: Isfahan
municipality," in Artificial Intelligence,
Management Science and Electronic Commerce
(AIMSEC), 2011 2nd International Conference
on, 2011, pp. 4644-4647.
[3] M. Alaedini, "Information Governance and
COBIT Framework Role in Its Implementation,"
Amirkabir University2009.
[4] A. Amid and A. Edalatpour, "Model for
Evaluation of Management Maturity of
Information Technology Projects: Case Study on
TRE Company," in Proceeding of 25th
International Conference on Electricity, Tehran,
2010.
[5] P. Afzali, E. Azmayandeh, R. Nassiri, and G. L.
Shabgahi, "Effective Governance through
simultaneous use of COBIT and Val IT," in
Education and Management Technology
(ICEMT), 2010 International Conference on,
2010, pp. 46-50.
[6] I. G. Institute. (2008). Val IT Framework 2.0
Available: www.isaca.org/valit
[7] L. Kumaralalita, A. N. Hidayanto, and D.
Chahyati, "Compliance analysis of IT investment
governance practices to Val IT 2.0 framework in
Indonesian commercial bank: The XYZ Bank
case study," in Advanced Computer Science and
Information System (ICACSIS ,)2011
International Conference on, 2011, pp. 297-304.
[8] I. G. Institute. (2012). COBIT 5. Available:
www.isaca.org/CobiT

More Related Content

What's hot

Superior it governance with iso 38500.key
Superior it governance with iso 38500.keySuperior it governance with iso 38500.key
Superior it governance with iso 38500.keyBasta Group BV
 
Initiating IT Governance Strategy to Identify Business Needs
Initiating IT Governance Strategy to Identify Business NeedsInitiating IT Governance Strategy to Identify Business Needs
Initiating IT Governance Strategy to Identify Business NeedsPECB
 
Critical Success Factors (CSFS) of Enterprise Resource Planning (ERP) System ...
Critical Success Factors (CSFS) of Enterprise Resource Planning (ERP) System ...Critical Success Factors (CSFS) of Enterprise Resource Planning (ERP) System ...
Critical Success Factors (CSFS) of Enterprise Resource Planning (ERP) System ...csandit
 
Information systems, organizations, management, and strategy
Information systems, organizations, management, and strategyInformation systems, organizations, management, and strategy
Information systems, organizations, management, and strategyProf. Othman Alsalloum
 
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500PECB
 
Corporate governance of INFORMATION TECHNOLOGY (IT)
Corporate governance of INFORMATION TECHNOLOGY (IT)Corporate governance of INFORMATION TECHNOLOGY (IT)
Corporate governance of INFORMATION TECHNOLOGY (IT)Osman Hasan
 
CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...
CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...
CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...ijait
 
Business process and is lecture 2
Business process and is lecture 2Business process and is lecture 2
Business process and is lecture 2Raphael Wanjiku
 
IT Governance Made Easy
IT Governance Made EasyIT Governance Made Easy
IT Governance Made EasyJerry Bishop
 
Management information system by eyadema simplisse
Management information system by eyadema simplisseManagement information system by eyadema simplisse
Management information system by eyadema simplisseEyadema_Simplisse
 
Cobit 2019 framework by ISACA
Cobit 2019 framework by ISACACobit 2019 framework by ISACA
Cobit 2019 framework by ISACAMDFazlaRabbiAbir
 
Information systems strategy formulation
Information systems strategy formulationInformation systems strategy formulation
Information systems strategy formulationAssignment Studio
 
empirical study on the status of moroccan information systems and proposition...
empirical study on the status of moroccan information systems and proposition...empirical study on the status of moroccan information systems and proposition...
empirical study on the status of moroccan information systems and proposition...INFOGAIN PUBLICATION
 
MIS IT -architecture-presentation
MIS IT -architecture-presentationMIS IT -architecture-presentation
MIS IT -architecture-presentationChris Groves
 
Review Factors of Organizational Structures and Organization Size on the ERP ...
Review Factors of Organizational Structures and Organization Size on the ERP ...Review Factors of Organizational Structures and Organization Size on the ERP ...
Review Factors of Organizational Structures and Organization Size on the ERP ...inventionjournals
 

What's hot (18)

Superior it governance with iso 38500.key
Superior it governance with iso 38500.keySuperior it governance with iso 38500.key
Superior it governance with iso 38500.key
 
Initiating IT Governance Strategy to Identify Business Needs
Initiating IT Governance Strategy to Identify Business NeedsInitiating IT Governance Strategy to Identify Business Needs
Initiating IT Governance Strategy to Identify Business Needs
 
Critical Success Factors (CSFS) of Enterprise Resource Planning (ERP) System ...
Critical Success Factors (CSFS) of Enterprise Resource Planning (ERP) System ...Critical Success Factors (CSFS) of Enterprise Resource Planning (ERP) System ...
Critical Success Factors (CSFS) of Enterprise Resource Planning (ERP) System ...
 
Information systems, organizations, management, and strategy
Information systems, organizations, management, and strategyInformation systems, organizations, management, and strategy
Information systems, organizations, management, and strategy
 
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
 
Corporate governance of INFORMATION TECHNOLOGY (IT)
Corporate governance of INFORMATION TECHNOLOGY (IT)Corporate governance of INFORMATION TECHNOLOGY (IT)
Corporate governance of INFORMATION TECHNOLOGY (IT)
 
CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...
CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...
CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...
 
Business process and is lecture 2
Business process and is lecture 2Business process and is lecture 2
Business process and is lecture 2
 
Introduction to mis
Introduction to misIntroduction to mis
Introduction to mis
 
IT Governance Made Easy
IT Governance Made EasyIT Governance Made Easy
IT Governance Made Easy
 
Management information system by eyadema simplisse
Management information system by eyadema simplisseManagement information system by eyadema simplisse
Management information system by eyadema simplisse
 
Management ( Six Business Objectives)
Management ( Six Business Objectives)Management ( Six Business Objectives)
Management ( Six Business Objectives)
 
Information system
Information  systemInformation  system
Information system
 
Cobit 2019 framework by ISACA
Cobit 2019 framework by ISACACobit 2019 framework by ISACA
Cobit 2019 framework by ISACA
 
Information systems strategy formulation
Information systems strategy formulationInformation systems strategy formulation
Information systems strategy formulation
 
empirical study on the status of moroccan information systems and proposition...
empirical study on the status of moroccan information systems and proposition...empirical study on the status of moroccan information systems and proposition...
empirical study on the status of moroccan information systems and proposition...
 
MIS IT -architecture-presentation
MIS IT -architecture-presentationMIS IT -architecture-presentation
MIS IT -architecture-presentation
 
Review Factors of Organizational Structures and Organization Size on the ERP ...
Review Factors of Organizational Structures and Organization Size on the ERP ...Review Factors of Organizational Structures and Organization Size on the ERP ...
Review Factors of Organizational Structures and Organization Size on the ERP ...
 

Similar to Presenting VALIT Frameworks and Comparing between Them and Other Enterprise Architecture Framework

rethinking marketing
rethinking marketingrethinking marketing
rethinking marketingNavneet Singh
 
IT-Governance.pptx
IT-Governance.pptxIT-Governance.pptx
IT-Governance.pptxJayLloyd8
 
WLS Services Brochure March 2013
WLS Services Brochure March 2013WLS Services Brochure March 2013
WLS Services Brochure March 2013Mike Wright
 
HOW COBIT CAN COMPLEMENT ITIL TO ACHIEVE BIT
HOW COBIT CAN COMPLEMENT ITIL TO ACHIEVE BIT HOW COBIT CAN COMPLEMENT ITIL TO ACHIEVE BIT
HOW COBIT CAN COMPLEMENT ITIL TO ACHIEVE BIT ecij
 
IT Governance Vs IT Management Presentation V0.1
IT Governance Vs IT Management   Presentation V0.1IT Governance Vs IT Management   Presentation V0.1
IT Governance Vs IT Management Presentation V0.1Richard Willis
 
Governance V3 (2)
Governance V3 (2)Governance V3 (2)
Governance V3 (2)guestf73e68
 
It governance practices and enterprise effectiveness in zimbabwe a case of a ...
It governance practices and enterprise effectiveness in zimbabwe a case of a ...It governance practices and enterprise effectiveness in zimbabwe a case of a ...
It governance practices and enterprise effectiveness in zimbabwe a case of a ...Alexander Decker
 
Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007David Cunningham
 
Using ITIL 4 and IT4IT together
Using ITIL 4 and IT4IT togetherUsing ITIL 4 and IT4IT together
Using ITIL 4 and IT4IT togetherRob Akershoek
 
The Room | Innotrain systematization
The Room | Innotrain systematization The Room | Innotrain systematization
The Room | Innotrain systematization Graphic Design Sydney
 
IT Governance & ISO 38500
IT Governance & ISO 38500IT Governance & ISO 38500
IT Governance & ISO 38500Ramiro Cid
 
CISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of ITCISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of ITShivamSharma909
 
A Case Study On Implementing ITIL In Business Organization Considering Busi...
A Case Study On Implementing ITIL In Business Organization   Considering Busi...A Case Study On Implementing ITIL In Business Organization   Considering Busi...
A Case Study On Implementing ITIL In Business Organization Considering Busi...Carrie Cox
 
Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseDesmond Devendran
 
Governance Tools Boyd Carter 2006
Governance Tools Boyd Carter 2006Governance Tools Boyd Carter 2006
Governance Tools Boyd Carter 2006Freelancer Training
 

Similar to Presenting VALIT Frameworks and Comparing between Them and Other Enterprise Architecture Framework (20)

rethinking marketing
rethinking marketingrethinking marketing
rethinking marketing
 
COBIT 2019 - DIGITAL TRUST FRAMEWORK
COBIT 2019 - DIGITAL TRUST FRAMEWORKCOBIT 2019 - DIGITAL TRUST FRAMEWORK
COBIT 2019 - DIGITAL TRUST FRAMEWORK
 
IT-Governance.pptx
IT-Governance.pptxIT-Governance.pptx
IT-Governance.pptx
 
It governance
It governanceIt governance
It governance
 
WLS Services Brochure March 2013
WLS Services Brochure March 2013WLS Services Brochure March 2013
WLS Services Brochure March 2013
 
HOW COBIT CAN COMPLEMENT ITIL TO ACHIEVE BIT
HOW COBIT CAN COMPLEMENT ITIL TO ACHIEVE BIT HOW COBIT CAN COMPLEMENT ITIL TO ACHIEVE BIT
HOW COBIT CAN COMPLEMENT ITIL TO ACHIEVE BIT
 
IT Governance Vs IT Management Presentation V0.1
IT Governance Vs IT Management   Presentation V0.1IT Governance Vs IT Management   Presentation V0.1
IT Governance Vs IT Management Presentation V0.1
 
Governance V3 (2)
Governance V3 (2)Governance V3 (2)
Governance V3 (2)
 
It governance practices and enterprise effectiveness in zimbabwe a case of a ...
It governance practices and enterprise effectiveness in zimbabwe a case of a ...It governance practices and enterprise effectiveness in zimbabwe a case of a ...
It governance practices and enterprise effectiveness in zimbabwe a case of a ...
 
Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007
 
Using ITIL 4 and IT4IT together
Using ITIL 4 and IT4IT togetherUsing ITIL 4 and IT4IT together
Using ITIL 4 and IT4IT together
 
The Room | Innotrain systematization
The Room | Innotrain systematization The Room | Innotrain systematization
The Room | Innotrain systematization
 
IT Governance & ISO 38500
IT Governance & ISO 38500IT Governance & ISO 38500
IT Governance & ISO 38500
 
01 intro-cobit
01 intro-cobit01 intro-cobit
01 intro-cobit
 
Dit yvol4iss30
Dit yvol4iss30Dit yvol4iss30
Dit yvol4iss30
 
CISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of ITCISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of IT
 
Sharpening the Lens
Sharpening the LensSharpening the Lens
Sharpening the Lens
 
A Case Study On Implementing ITIL In Business Organization Considering Busi...
A Case Study On Implementing ITIL In Business Organization   Considering Busi...A Case Study On Implementing ITIL In Business Organization   Considering Busi...
A Case Study On Implementing ITIL In Business Organization Considering Busi...
 
Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review Course
 
Governance Tools Boyd Carter 2006
Governance Tools Boyd Carter 2006Governance Tools Boyd Carter 2006
Governance Tools Boyd Carter 2006
 

More from Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyEswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerEswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersEswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasEswar Publications
 

More from Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Recently uploaded

Resistivity log Wireline Logging presentation.pdf
Resistivity log Wireline Logging presentation.pdfResistivity log Wireline Logging presentation.pdf
Resistivity log Wireline Logging presentation.pdfAkashTomar468516
 
applications of diffrentiability in real life.pptx
applications of diffrentiability in real life.pptxapplications of diffrentiability in real life.pptx
applications of diffrentiability in real life.pptxananditam30
 
Progress Measurement System in EPC Projects
Progress Measurement System in EPC ProjectsProgress Measurement System in EPC Projects
Progress Measurement System in EPC ProjectsWrench Solutions (P) Ltd
 
Identify the Best Penetration Testing Services in the UK Aardwolf Security.pptx
Identify the Best Penetration Testing Services in the UK Aardwolf Security.pptxIdentify the Best Penetration Testing Services in the UK Aardwolf Security.pptx
Identify the Best Penetration Testing Services in the UK Aardwolf Security.pptxAardwolf Security
 
input buffering in lexical analysis in CD
input buffering in lexical analysis in CDinput buffering in lexical analysis in CD
input buffering in lexical analysis in CDHeadOfDepartmentComp1
 
Types of Additive Manufacturing in industries.pptx
Types of Additive Manufacturing in industries.pptxTypes of Additive Manufacturing in industries.pptx
Types of Additive Manufacturing in industries.pptxRamasamyN4
 
How to Implement Effective Stormwater Management in DC
How to Implement Effective Stormwater Management in DCHow to Implement Effective Stormwater Management in DC
How to Implement Effective Stormwater Management in DCSera Engineered, LLC
 
Pyrolysis process control: temperature control design and application for opt...
Pyrolysis process control: temperature control design and application for opt...Pyrolysis process control: temperature control design and application for opt...
Pyrolysis process control: temperature control design and application for opt...IJECEIAES
 
Overview of IS 16700:2023 (by priyansh verma)
Overview of IS 16700:2023 (by priyansh verma)Overview of IS 16700:2023 (by priyansh verma)
Overview of IS 16700:2023 (by priyansh verma)Priyansh
 
Qari-NO1 Genuine vashikaran specialist Vashikaran baba near Lahore Vashikaran...
Qari-NO1 Genuine vashikaran specialist Vashikaran baba near Lahore Vashikaran...Qari-NO1 Genuine vashikaran specialist Vashikaran baba near Lahore Vashikaran...
Qari-NO1 Genuine vashikaran specialist Vashikaran baba near Lahore Vashikaran...Amil baba
 
Introduction of Object Oriented Programming Language using Java. .pptx
Introduction of Object Oriented Programming Language using Java. .pptxIntroduction of Object Oriented Programming Language using Java. .pptx
Introduction of Object Oriented Programming Language using Java. .pptxPoonam60376
 
Biomaterials and biosciences biometals.pptx
Biomaterials and biosciences biometals.pptxBiomaterials and biosciences biometals.pptx
Biomaterials and biosciences biometals.pptxKoustavGhosh26
 
BaseBand-6630-Moshell-Commands .pdf
BaseBand-6630-Moshell-Commands      .pdfBaseBand-6630-Moshell-Commands      .pdf
BaseBand-6630-Moshell-Commands .pdfwafawafa52
 
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...KrishnaveniKrishnara1
 
Deceth series HLB value for hard surface cleaner applications.pdf
Deceth series HLB value for hard surface cleaner applications.pdfDeceth series HLB value for hard surface cleaner applications.pdf
Deceth series HLB value for hard surface cleaner applications.pdflzhao5
 
Network Enhancements on BitVisor for BitVisor Summit 12
Network Enhancements on BitVisor for BitVisor Summit 12Network Enhancements on BitVisor for BitVisor Summit 12
Network Enhancements on BitVisor for BitVisor Summit 12cjchen22
 
apple vision pro.pptxadsxscdsaCxaszxsdzx
apple vision pro.pptxadsxscdsaCxaszxsdzxapple vision pro.pptxadsxscdsaCxaszxsdzx
apple vision pro.pptxadsxscdsaCxaszxsdzxChetanM43
 
Design and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture NotesDesign and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture NotesSreedhar Chowdam
 
Interview Cathodic-Protection (Corrosion).ppt
Interview Cathodic-Protection (Corrosion).pptInterview Cathodic-Protection (Corrosion).ppt
Interview Cathodic-Protection (Corrosion).pptArfanAli50
 
AI Powered Ecover creator that creates everything that you want
AI Powered Ecover creator that creates everything that you wantAI Powered Ecover creator that creates everything that you want
AI Powered Ecover creator that creates everything that you wantsuja868966
 

Recently uploaded (20)

Resistivity log Wireline Logging presentation.pdf
Resistivity log Wireline Logging presentation.pdfResistivity log Wireline Logging presentation.pdf
Resistivity log Wireline Logging presentation.pdf
 
applications of diffrentiability in real life.pptx
applications of diffrentiability in real life.pptxapplications of diffrentiability in real life.pptx
applications of diffrentiability in real life.pptx
 
Progress Measurement System in EPC Projects
Progress Measurement System in EPC ProjectsProgress Measurement System in EPC Projects
Progress Measurement System in EPC Projects
 
Identify the Best Penetration Testing Services in the UK Aardwolf Security.pptx
Identify the Best Penetration Testing Services in the UK Aardwolf Security.pptxIdentify the Best Penetration Testing Services in the UK Aardwolf Security.pptx
Identify the Best Penetration Testing Services in the UK Aardwolf Security.pptx
 
input buffering in lexical analysis in CD
input buffering in lexical analysis in CDinput buffering in lexical analysis in CD
input buffering in lexical analysis in CD
 
Types of Additive Manufacturing in industries.pptx
Types of Additive Manufacturing in industries.pptxTypes of Additive Manufacturing in industries.pptx
Types of Additive Manufacturing in industries.pptx
 
How to Implement Effective Stormwater Management in DC
How to Implement Effective Stormwater Management in DCHow to Implement Effective Stormwater Management in DC
How to Implement Effective Stormwater Management in DC
 
Pyrolysis process control: temperature control design and application for opt...
Pyrolysis process control: temperature control design and application for opt...Pyrolysis process control: temperature control design and application for opt...
Pyrolysis process control: temperature control design and application for opt...
 
Overview of IS 16700:2023 (by priyansh verma)
Overview of IS 16700:2023 (by priyansh verma)Overview of IS 16700:2023 (by priyansh verma)
Overview of IS 16700:2023 (by priyansh verma)
 
Qari-NO1 Genuine vashikaran specialist Vashikaran baba near Lahore Vashikaran...
Qari-NO1 Genuine vashikaran specialist Vashikaran baba near Lahore Vashikaran...Qari-NO1 Genuine vashikaran specialist Vashikaran baba near Lahore Vashikaran...
Qari-NO1 Genuine vashikaran specialist Vashikaran baba near Lahore Vashikaran...
 
Introduction of Object Oriented Programming Language using Java. .pptx
Introduction of Object Oriented Programming Language using Java. .pptxIntroduction of Object Oriented Programming Language using Java. .pptx
Introduction of Object Oriented Programming Language using Java. .pptx
 
Biomaterials and biosciences biometals.pptx
Biomaterials and biosciences biometals.pptxBiomaterials and biosciences biometals.pptx
Biomaterials and biosciences biometals.pptx
 
BaseBand-6630-Moshell-Commands .pdf
BaseBand-6630-Moshell-Commands      .pdfBaseBand-6630-Moshell-Commands      .pdf
BaseBand-6630-Moshell-Commands .pdf
 
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
 
Deceth series HLB value for hard surface cleaner applications.pdf
Deceth series HLB value for hard surface cleaner applications.pdfDeceth series HLB value for hard surface cleaner applications.pdf
Deceth series HLB value for hard surface cleaner applications.pdf
 
Network Enhancements on BitVisor for BitVisor Summit 12
Network Enhancements on BitVisor for BitVisor Summit 12Network Enhancements on BitVisor for BitVisor Summit 12
Network Enhancements on BitVisor for BitVisor Summit 12
 
apple vision pro.pptxadsxscdsaCxaszxsdzx
apple vision pro.pptxadsxscdsaCxaszxsdzxapple vision pro.pptxadsxscdsaCxaszxsdzx
apple vision pro.pptxadsxscdsaCxaszxsdzx
 
Design and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture NotesDesign and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture Notes
 
Interview Cathodic-Protection (Corrosion).ppt
Interview Cathodic-Protection (Corrosion).pptInterview Cathodic-Protection (Corrosion).ppt
Interview Cathodic-Protection (Corrosion).ppt
 
AI Powered Ecover creator that creates everything that you want
AI Powered Ecover creator that creates everything that you wantAI Powered Ecover creator that creates everything that you want
AI Powered Ecover creator that creates everything that you want
 

Presenting VALIT Frameworks and Comparing between Them and Other Enterprise Architecture Framework

  • 1. Int. J. Advanced Networking and Applications Volume: 07 Issue: 04 Pages: 2805-2809 (2016) ISSN: 0975-0290 2805 Presenting VALIT Frameworks and Comparing between Them and Other Enterprise Architecture Framework Alireza Poorebrahimi Department of Information Technology Management, Islamic Azad University, Science & Research Branch of Tehran, Iran Email: poorebrahimi@gmail.com Firouzeh Razavi Department of Information Technology Management, Islamic Azad University, Science & Research Branch of Tehran, Iran Email: firozehrazavi@gmail.com Fatemeh SoleimaniRoozbahani Razavi Department of Information Technology Management, Islamic Azad University, Science & Research Branch of Tehran, Iran Email: fatemeh.solaymani@srbiau.ac.ir ----------------------------------------------------------------------ABSTRACT----------------------------------------------------------- It is necessary for each organization to move towards process-focused that it is supported and presided by information technology (IT). IT is considered as a part of processes field. In the information technology era, especially with the advent of network-based economy, organizations plans must be performed based on an architectural design deserving Information Society. Enterprise Architecture provides a framework to design organization based on Information Technology. Val IT framework is not related to enterprise architecture frameworks, but rather to IT governance. IT governance is indeed a paradigm in which it is attempted to make all activities and enterprise mechanisms for the planning, organizing, implementation and control of IT aligned and consistent. This study first discusses the introduction of this framework; then, a comparison between this framework and COBIT as well as between enterprise architecture and Val IT will be done. Keywords: Enterprise Architecture Frameworks; COBIT; IT Government; Val IT Framework; ------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: Jan 25, 2016 Date of Acceptance: Feb 02, 2016 ------------------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION In 21st century, organizations are moving to be process- focused and managers are concentrated on company's processes; as a result, IT is a factor enabled for this information [1]. Organizations need IT to increase the integration and standardization of processes speed up the process of globalization, restructure and changes frequent to business. Information Technology helps organization be process-focused. In this way, four processes and an IT- related principle (i.e. architecture) support organization. In fact, architecture indicates that how IT infrastructure will be created and maintained. IT architecture is a plan or a high-level scheme of an organization's information properties including the physical plan of a structure which in hardware is located. In fact, IT architecture is a tip and plan for current activities to direct the future ones [2]. Providing IT architecture is a periodical process taken from architecture. Top managers have found out that information technology can significantly influence on organization success. Managers hope that they increase competitive power of organization by understanding and recognizing applied IT-based methods or it is likely to obtain their successful application. So managers are going to ensure that IT organizations are looking for IT governance strategies and they require increasing management and supervision on IT. II. IT GOVERNANCE A. What is IT governance? IT governance is considered as an integral part of organization management. Governance is not a new concept but it has existed since human civilization. In fact, governance is meant to decision-making and implementation of decisions [3]. Governance can be based on participatory, international, national and local governance. IT governance is a kind like this, as well. IT governance is a phrase used to describe how people consider IT for supervising, monitoring, controlling and leading attention in order to manage an organization. IT governance is the responsibility of the executive board and it focuses on the effective management of communication and information technology. An integral part of the organization includes organizing and leadership of structures and processes to ensure whether organization information technology supports and develops objectives and strategies of the organization or not. Managers has some negative experiences of this technology adaption such as loss of
  • 2. Int. J. Advanced Networking and Applications Volume: 07 Issue: 04 Pages: 2805-2809 (2016) ISSN: 0975-0290 2806 credibility, delay in services, lack of performance of main processes of IT organization and its early failure leading organization to perform IT governance leadership and due to these IT governance become significant and was employed in organizations [1]. To ensure achieving IT performance for following objectives, IT governance is used:  Aligning IT with the organization and realizing promised profits.  Using information technology to enable organizations in order to take advantage of opportunities and maximize the profits;  Using resources related to IT as appropriate  Appropriate risk management related to IT IT leadership usually determines deviations from targets in different layers by reporting supervisors to managers, managers to executives and then to the board and in order to solve them, necessary work is done with the approval of management [4]. B. The significance of IT governance IT governance is important and often, expectations do not comply with what happens in reality; thus, management should be done on:  Using IT facilities with appropriate quality and funding;  Controlling and using information technology to return commercial value;  Using information technology to increase productivity and efficiency while controlling IT risks. For complete implementation of IT governance, there are different standards such as COBIT, Related Cadbury and Turnbull that among them, VAL IT and COBIT (provided by the Institute of IT Governance) are accepted as a good model for control of information, IT and related risks and they have been selected for IT auditing leadership and implementation. III. VAL IT FRAMEWORK Primary Val IT helps organizations to realize value through optimizing the investment. Primary Val IT encompasses a comprehensive set of research activities, publications and aid services and it supports Val IT framework core [5] (Fig. 1 shows Primary Val IT). Figure1. Val IT framework Val IT framework is almost consistent with COBIT. COBIT provides a complete framework to deliver IT services at a high level. COBIT set adjusts good practices for processes of providing value, while Val IT provides methods for the purposes that present some mechanisms to measure, monitor and optimize the realization of investments' business value in IT [5]. A. How Val IT is structured? Val IT framework is structured in three fields that each one includes a several processes and is performed through the method of key management and also they have maturity model individually including 5 steps [6]: Figure2. Maturity steps Value governance  determining and implementing the processes  providing effective governance supervision  determining portfolio details  Continuous improvement of value management practices portfolio management  Evaluation program for financial expenses  Determining the availability and financial resources  Human resources availability management  Improving the performance of investment portfolio  Monitoring and reporting on the performance of investment portfolio Val IT framework Empirical Analysis criteria determinatio n sample technique manual stock company communicati on impact step 0•Non-existent step 1•Initial step 2•Repeatable step 3•Defined step 4•Managed step 5•Optimize
  • 3. Int. J. Advanced Networking and Applications Volume: 07 Issue: 04 Pages: 2805-2809 (2016) ISSN: 0975-0290 2807 Investment management  Update business samples  Understand the candidate program and implement options  Monitor and report on program  Implementation and management of programs  Update operational IT portfolio IV. VAL IT VERSION 2.0 Val IT version 2.0 was released in July 2008 in which more terms were nearly adopted with COBIT. It also added more depth through added management guidelines. However, these outlines create more detail in Val IT processes, key management practices as well as maturity models for each VAL IT area. The latest version, Version 2.0 Val IT framework, including IT services, assets and other resources developed through new investments. This complete and comprehensive framework leading to help create investment through IT presents a practical set of governance principles, processes and methods. This framework also supports the guidelines that help the executive management team and the other organizations leaders. This framework provides direct support for implementation at all levels of management both in business and information technology. The existing framework provides benchmarking capabilities and helps organizations exchange experiences on best practices for value management [7]. Mentioned framework providing a guide through the operational tools and publications is supported by them. This includes:  Finding the relationship between businesses and IT done by the responsible authority in organizations;  Portfolio management of IT-based business Investment;  Maximizing quality of business samples for investment that specifically emphasizes on the definition of financial indicators, earnings and comprehensive assessment of risks. A. VAL IT framework components Val IT framework takes into account enterprise governance views and helps managers about 4 questions of IT governance. These four questions are as follows: (Figure 3) Figure3. IT governance questions 1. Do we do the right things? (strategic question) 2. Do we get the profits? (value question) 3. Do we perform correctly? (Architecture question), On the other hand COBIT encompasses IT perspective and managers support to answer these questions. 4. Do we obtain them properly? (Delivery question) Val IT framework helps increase the probability of optional investment and create value by the highest potential. This framework cuts down the costs and help to decision-makers whether they should do the right things in the investment or not". It also reduces the risk of failure and issues related to delivery and information technology costs. In contrast, it increases business value and information technology confidence level in the board, executive management, and the other organizations' leaders [2]. B. similarities between COBIT, VAL IT Val IT and COBIT provide a synergistic relationship. It is essential to understand the relationship between these two frameworks. In fact, Val IT framework complements COBIT from a business and financial perspective and help any business or professional IT with tendency to value creation [6]. A connection between COBIT, VAL IT portfolio management and investment mechanism is possible. They offer an area in IT processes: PO1: strategic IT planning, PO5: Investment Management in Information Technology, PO10: Projects Management DS1: Definition and management of service levels ME1: monitoring and evaluation of IT performance 1. Difference between COBIT and VALIT VAL IT provides a framework for investment and current value management and presents some aspects of this framework for performing plans and earning delivery and onset. While COBIT offers a framework for the implementation of related IT and provides programs' aspects [8]. These programs include the delivery of information technology strategies, operational implementation of information technology and service Do we do the right things? Do we get the benefits? Do we perform correctly? Do we do things the right way?
  • 4. Int. J. Advanced Networking and Applications Volume: 07 Issue: 04 Pages: 2805-2809 (2016) ISSN: 0975-0290 2808 delivery. However, Val IT framework can be implemented without COBIT. Table 1 compares these two frameworks. Governance focus Portfolio focus Process focus  Enterprise governance  Informatio n technology  Investmen t portfolio management  Providing general view of portfolio performance  aspects of Investment and current value managementVal IT  IT governance  IT project portfolio management  IT service management, assets and other resources portfolio  Offering IT strategy  Operational implementatio n of IT  IT service delivery COBI T Table 1: Comparison of Val IT and COBIT framework Now, it is proposed the general comparison between IT governance and architecture organization with regard to the introduction of this framework and its other family (COBIT). First, we define the alignment:  "Management and use of IT in organization in order to respond to business needs, enable new objectives and obtain competitive advantage" Aligning business and IT can be considered as "relationship-, "architecture-, and governance-based". In this paper, these two dimensions (architecture and governance) are taken account. It can be pointed that there is a profound difference between IT governance and enterprise architecture: IT governance: It ensures that while IT supports business objectives, optimizes business investment in IT and manages IT-related risks and opportunities. Enterprise architecture governance (EA governance) is more complex than IT governance and is associated with architecture governance. Governance focus in a SOA environment is that we confide to service-oriented strategy in the capabilities, assets and investments providing and delivering the necessary levels of business capability and technique. C. Comparison between IT governance and enterprise architecture According to the distinction between IT governance and enterprise architecture and how it is used in organization, a general comparison between them was conducted in Table2. Governance- based Enterprise architecture- based COBIT, Val IT strategy map Zach man, Federal, FEAF, TOGAF / EAPModel / Method Provide value, resource control, performance evaluation Integration of applications, modeling processesViewpoint Reform / PolicyVisas / scenarios Stimulus It has 5 steps Jaap Schekkerman model (IFEAD model– Institute For Enterprise Architecture Developments( Enterprise Architecture Maturity Determine the processes and activities (top- down) quality of enterprise architectureMetrics - Exist in the framework of the architectureSOA Exist in Val IT, COBIT not mention directly Deliver value and realized profit and minimize risk Table 2: Comparison of IT governance and enterprise architecture V. CONCLUSION IT is an integral part of the business and its governance is an integral part of organization management. In IT governance, it should be clearly specified the roles and responsibilities. In fact, it is paradigmatic in which it is tried to align all activities and enterprise mechanism for the planning, organization, implementation and control of IT. Val IT framework is related to IT governance and includes accepted guidelines and supported processes. They are associated to the evaluation and selection of investment business, profit realization and value delivery. This framework is based on the COBIT and management processes are used to provide Val IT principles and return on investment. Mentioned management processes include value governance, portfolio management, and investment management. In fact, this framework is related to expenses, risks and outcomes. These balance business investment portfolio. Existing frameworks of enterprise architecture are more complex than Val IT.
  • 5. Int. J. Advanced Networking and Applications Volume: 07 Issue: 04 Pages: 2805-2809 (2016) ISSN: 0975-0290 2809 REFERENCES [1] S. R. Khayami, "Organization Analysis and Architecture," Shiraz University, 2009. [2] Z. Nourizadeh, A. Nourizadeh, and M. Mahdavi, "Implementing information technology governance using val IT; Case study: Isfahan municipality," in Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), 2011 2nd International Conference on, 2011, pp. 4644-4647. [3] M. Alaedini, "Information Governance and COBIT Framework Role in Its Implementation," Amirkabir University2009. [4] A. Amid and A. Edalatpour, "Model for Evaluation of Management Maturity of Information Technology Projects: Case Study on TRE Company," in Proceeding of 25th International Conference on Electricity, Tehran, 2010. [5] P. Afzali, E. Azmayandeh, R. Nassiri, and G. L. Shabgahi, "Effective Governance through simultaneous use of COBIT and Val IT," in Education and Management Technology (ICEMT), 2010 International Conference on, 2010, pp. 46-50. [6] I. G. Institute. (2008). Val IT Framework 2.0 Available: www.isaca.org/valit [7] L. Kumaralalita, A. N. Hidayanto, and D. Chahyati, "Compliance analysis of IT investment governance practices to Val IT 2.0 framework in Indonesian commercial bank: The XYZ Bank case study," in Advanced Computer Science and Information System (ICACSIS ,)2011 International Conference on, 2011, pp. 297-304. [8] I. G. Institute. (2012). COBIT 5. Available: www.isaca.org/CobiT